Secdir last call review of draft-ietf-ippm-stamp-07

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Reviewer: Russ Housley
Review result: Has Issues

I reviewed this document as part of the Security Directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Security Area
Directors.  Document authors, document editors, and WG chairs should
treat these comments just like any other IETF Last Call comments.

Document: draft-ietf-ippm-stamp-07
Reviewer: Russ Housley
Review Date: 2019-08-22
IETF LC End Date: 2019-09-03
IESG Telechat date: unknown

Summary: Has Issues


Major Concerns:

Section 4.1.1: This paragraph is a bit surprising:

      The STAMP Session-Sender and Session-Reflector MAY use, not use,
      or set value of the Z field in accordance with the timestamp
      format in use.  This optional field is to enhance operations, but
      local configuration or defaults could be used in its place.

Why not have this bit set to align with the bits that actually appear
in the packet?  This is especially worrisome because of the text that
come later (Section 4.2.1), which says:

   o  Timestamp and Receiver Timestamp fields are each eight octets
      long.  The format of these fields, NTP or PTPv2, indicated by the
      Z flag of the Error Estimate field as described in Section 4.1.

If the Z field (or Z flag) is not really meaningful, I do not see how
the peer knows how to interpret a received timestamp.


Section 4.3:  Please divide this into two sections.  First, you have
picked a single mechanism for authentication (HMAC-SHA-256 truncated
to 128 bits).  This choice seems fine to me, even though you are not
saying much about the key management.  I would prefer that you have
a mandatory to implement key management technique, but allow others;
however, I am not going to insist on that.  Then, a separate section
should talk about confidentiality protection.


Section 4.3:  This text needs work:

   If confidentiality protection for STAMP is required, encryption at
   the higher level MUST be used.  For example, STAMP packets could be
   transmitted in the dedicated IPsec tunnel or share the IPsec tunnel
   with the monitored flow.

I find "at the higher level" very unclear.  I believe that IPsec would
be below this protocol.

I think that DTLS would also provide the confidentiality protection
that you desire.  Since you are not specifying any details of the
encryption, you can say that a "secured transport" (the term that you
use in the Security Considerations) such as IPsec or DTLS can be used.


Minor Concerns:

Section 1:  I do not follow this topic, and this may be clear to your
expected reader, but it is not clear to me.  The Introduction does not
tell me the relationship of TWAMP Light and [BBF.TR-390] to this
document.  One possible way to resolve this is to divide the section
into four parts: (1) background and history of measurement protocols;
(2) shortcoming of those protocols; (3) what this document does to
resolve those shortcomings; and (4) pointers to other documents that
make up the rest of the shortcoming resolution.


Nits:

The document uses "Z field" and "Z flag".  Please pick one and use it
throughout the document.

These terms are defined in Section 2.1, but they are not used in the
rest of the document:

   AES Advanced Encryption Standard

   CBC Cipher Block Chaining

   ECB Electronic Cookbook

   KEK Key-encryption Key






[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux